Vulnerability Category: A6- Security Misconfiguration Vulnerability Description: OAuth 2.0 is an authorization framework for Web Application. It validates the identity of a user to the website which requested it without disclosing passwords to the website. Vulnerability in OAuth flow leads to takeover of victim account . Impact: An attacker can take over the account of […]
7 pentesting projects for your CV | 1 for each networking layer
Hello, Today I’ll share some useful pentesting tools which are very useful for beginners. Below are helpful tools and a note describing the project. Layer 1: -Nmap https://nmap.org/-Rogue device detection https://lnkd.in/et_ActfnProject: Use Nmap to investigate rogue devices. Layer 2: -Yersinia https://lnkd.in/e6C9eFSH-Wireshark https://www.wireshark.org/Project: Run Wireshark, capture, and attack with Yersinia. Layer 3:-Ettercap https://lnkd.in/eW3XSDxyProject: Use Ettercap for MITM attacks. Layer 4:-Dsniff https://lnkd.in/eptT256DProject: Try TCP spoofing […]
How I Found Unauthorized Bypass RCE
Easy Vulnerability Leads To admin Console, P1 type So I even have commenced looking on one target to deliver me permission to Disclosed Name of the Program} Let’s start after looking at a few low hanging. And after a few Recon, I turned into looking on Technologies which turned into Web common sense Services and […]